Sciweavers

2028 search results - page 85 / 406
» Highly Predictive Blacklisting
Sort
View
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
14 years 1 months ago
Using Prediction to Accelerate Coherence Protocols
Most large shared-memory multiprocessors use directory protocols to keep per-processor caches coherent. Some memory references in such systems, however, suffer long latencies for ...
Shubhendu S. Mukherjee, Mark D. Hill
MICRO
1994
IEEE
123views Hardware» more  MICRO 1994»
14 years 1 months ago
The effects of predicated execution on branch prediction
High performance architectures have always had to deal with the performance-limiting impact of branch operations. Microprocessor designs are going to have to deal with this proble...
Gary S. Tyson
DAIS
2010
13 years 10 months ago
Structured Context Prediction: A Generic Approach
Context-aware applications and middleware platforms are evolving into major driving factors for pervasive systems. The ability to also make accurate assumptions about future contex...
Matthias Meiners, Sonja Zaplata, Winfried Lamersdo...
TCSV
2008
94views more  TCSV 2008»
13 years 9 months ago
FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors
This paper proposes a fine granularity scalable (FGS) coding using cycle-based leaky prediction, in which the multiple leaky factors are used to yield enhancement layer prediction ...
Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu, W...
ICST
2010
IEEE
13 years 7 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...